3,191 research outputs found

    Experimentally implementable criteria revealing substructures of genuine multipartite entanglement

    Full text link
    We present a general framework that reveals substructures of genuine multipartite entanglement. Via simple inequalities it is possible to discriminate different sets of multipartite qubit states. These inequalities are beneficial regarding experimental examinations as only local measurements are required. Furthermore, the number of observables scales favorably with system size. In exemplary cases we demonstrate the noise resistance and discuss implementations.Comment: 14 pages, 4 figure

    Molecular mechanisms of neuroinvasion by monocytes-macrophages in HIV-1 infection

    Get PDF
    HIV associated neurocognitive disorders and their histopathological correlates largely depend on the continuous seeding of the central nervous system with immune activated leukocytes, mainly monocytes/macrophages from the periphery. The blood-brain-barrier plays a critical role in this never stopping neuroinvasion, although it appears unaltered until the late stage of HIV encephalitis. HIV flux that moves toward the brain thus relies on hijacking and exacerbating the physiological mechanisms that govern blood brain barrier crossing rather than barrier disruption. This review will summarize the recent data describing neuroinvasion by HIV with a focus on the molecular mechanisms involved

    Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing

    Full text link
    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Bu\v{z}ek and Berthiaume [Phys. Rev A \textbf{59}, 1829 (1999)]. We focus on a generalization of the HBB protocol to nn communication parties thus including nn-partite GHZ states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large nn. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Minert, A. Gabriel, B. C. Hiesmayr, Phys. Rev. Lett. \textbf{104}, 210501 (2010)] to detect certain genuine nn partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.Comment: 5 pages, submitted to Phys. Rev.

    Purification of genuine multipartite entanglement

    Full text link
    In tasks, where multipartite entanglement plays a central role, state purification is, due to inevitable noise, a crucial part of the procedure. We consider a scenario exploiting the multipartite entanglement in a straightforward multipartite purification algorithm and compare it to bipartite purification procedures combined with state teleportation. While complete purification requires an infinite amount of input states in both cases, we show that for an imperfect output fidelity the multipartite procedure exhibits a major advantage in terms of input states used.Comment: 5 pages, 2 figure

    Motley-cue: SSH access with OIDC tokens

    Get PDF
    • …
    corecore